General

  • Target

    6e6093efd0b783a44ebf2864ea163218e0cc9ec5ac2f5f0d0bcf53ca706c8bb0

  • Size

    206KB

  • Sample

    220907-k56xvabec6

  • MD5

    756a84a658731cbafacf51c7d78d7614

  • SHA1

    d436cc215352debfc258a6fdef80ab61a7b51c62

  • SHA256

    6e6093efd0b783a44ebf2864ea163218e0cc9ec5ac2f5f0d0bcf53ca706c8bb0

  • SHA512

    76f4b8d0ddb17be797035d0e970aca83aefec86c7174b8277dcec81652b63080745967edf4d39f613c58c53952058e236c74a68b058a4318f7f3f26dde46b7bb

  • SSDEEP

    3072:j1VPvEEgeTDeRNYLEuiUoCZhK7+oO3hC+Rv47:Z54eqqzpv

Malware Config

Extracted

Family

redline

Botnet

747

C2

78.153.144.6:2510

Attributes
  • auth_value

    842e51893ada92572d9bc2e846237976

Extracted

Family

redline

Botnet

nam5

C2

103.89.90.61:34589

Attributes
  • auth_value

    f23be8e9063fe5d0c6fc3ee8e7d565bd

Targets

    • Target

      6e6093efd0b783a44ebf2864ea163218e0cc9ec5ac2f5f0d0bcf53ca706c8bb0

    • Size

      206KB

    • MD5

      756a84a658731cbafacf51c7d78d7614

    • SHA1

      d436cc215352debfc258a6fdef80ab61a7b51c62

    • SHA256

      6e6093efd0b783a44ebf2864ea163218e0cc9ec5ac2f5f0d0bcf53ca706c8bb0

    • SHA512

      76f4b8d0ddb17be797035d0e970aca83aefec86c7174b8277dcec81652b63080745967edf4d39f613c58c53952058e236c74a68b058a4318f7f3f26dde46b7bb

    • SSDEEP

      3072:j1VPvEEgeTDeRNYLEuiUoCZhK7+oO3hC+Rv47:Z54eqqzpv

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks